ExamGecko
Ask Question

Salesforce Certified MuleSoft Developer II Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A'S Object Store?

Object Store v2 REST API
Object Store v2 REST API
CloudHub Connector
CloudHub Connector
Object Store Connector
Object Store Connector
CloudHub REST API
CloudHub REST API
Suggested answer: A
Explanation:

To remove values from Mule application A's Object Store v2, Mule application B can use Object Store v2 REST API. This API allows performing operations on Object Store v2 resources using HTTP methods, such as GET, POST, PUT, and DELETE. Mule application B can use the DELETE method to remove values from Mule application A's Object Store v2 by specifying the object store ID and the key of the value to delete.

Reference: https://docs.mulesoft.com/object-store/osv2-apis

asked 23/09/2024
Robert Calderon
39 questions

Question 12

Report Export Collapse

Refer to the exhibit.

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

B)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

C)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

D)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

Become a Premium Member for full access
  Unlock Premium Member

Question 13

Report Export Collapse

The flow is invoicing a target API. The API's protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.

Salesforce Certified MuleSoft Developer II image Question 13 65970 09232024002859000000

If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?

Become a Premium Member for full access
  Unlock Premium Member

Question 14

Report Export Collapse

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

Become a Premium Member for full access
  Unlock Premium Member

Question 15

Report Export Collapse

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer'' flow is added validate the data.

What is he expected behavior of the 'validate-customer'' flow?

Salesforce Certified MuleSoft Developer II image Question 16 65973 09232024002859000000

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

Which statement is true about using mutual TLS to secure an application?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Which statement is true when using XML SDK for creating custom message processors?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Become a Premium Member for full access
  Unlock Premium Member
Total 60 questions
Go to page: of 6
Search

Related questions